The industry group is offering $10,000 to the first person to break into former CIA Chief Technology Officer Bob Flores’ account, which is protected by the technology. As a sweetener, the organizers will publicly publish Flores’ username and password. Two previous challenges have yet to produce a breach, calling to mind the seemingly impossible-to-hack Gibson supercomputer from the 1995 film Hackers.

So what is a software-defined perimeter? In short, it manages network access by sending login requests through a central software controller, which grants access to cloud-based applications on a case-by-case basis, rather than to the network as a whole.

It’s one approach to solving the breakdown of classic approaches to network security, which focus on the perimeter around a company’s network — a little like building a wall around a city, but not hiring a police force. It works when users and applications are always in one place (and users can be trusted with full access), but has come under threat by the introduction of mobile devices and cloud applications.

“One concept we stole ideas from was software-defined networking,” says Mark Hoover, CEO of security startup Vidder, which makes a commercial product built on the CSA framework. “Software-defined perimeter builds access control from users to servers, similar to how SDN creates associations of servers.”

The approach requires software on end-users’ devices and uses device authentication to head off attacks using stolen credentials — the reason the CSA challenge’s organizers will give would-be hackers a valid password.

The challenge begins on April 20, when CSA will announce Flores’ login credentials online here on the first day of the RSA security conference in San Francisco.

“The LAN was built for the enterprise of the 90s, not the 2010s,” says Hoover. “Now your users are all over the place; your applications are moving into the cloud. The physical model just doesn’t fit anymore.”

SPONSORED

Keith Griffith was a senior reporter at SDxCentral covering digital security, open source, and cloud. He is based in New York City, currently attending Columbia University Graduate School of Journalism. Keith has previously reported on business and technology for Business Insider and the Chicago Sun-Times, among others.

Win a $200 Amazon Gift Card

New Report: 2016 Cloud Automation and DevOps Report – What’s Next for Networking in the Cloud?

2016 Cloud Automation and DevOps Report: What’s Next for Networking in the Cloud? is available for free download. This FREE Report examines how cloud management, automation, and DevOps are likely to influence and integrate with networking and SDx technology in the future.

About SDxCentral

Engage With us

This material may not be copied, reproduced, or modified in whole or in part for any purpose except with express written permission from an authorized representative of SDNCentral, LLC. In addition to such written permission to copy, reproduce, or modify this document in whole or part, an acknowledgement of the authors of the document and all applicable portions of the copyright notice must be clearly referenced. All Rights Reserved.